News about Oracle's Solaris and Sun Hardware
System News
Sep 17th, 2012 — Sep 23rd, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 175, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Profit : August, 2012
New Issue Now Available
The August 2012 issue of Profit is now available online. Contents include:

  • The Middleware Advantage
  • Playing to Win
  • Adjustable Loans
  • Future Proof
  • Spring Training
  • Keeping Online Customers Happy

Profit's editor says, "Technologies continuously evolve—some become standard practice, some are revived or reinvented, and some are left by the wayside. But the drive to innovate and the desire to succeed are business principles that never go out of fashion."

Best Practices for Building a Virtualized SPARC Computing Environment: White Paper
Oracle Enterprise Manager Ops Center 12c Controls Configuration
"Best Practices for Building a Virtualizedd SPARC Computing Environment," an Oracle white paper, shows how to plan for and implement a robust, scalable and highly performant virtualized computing environment using the full Oracle stack: Oracle SPARC T4 servers, Sun 10GbE switches, and Sun FS Storage Appliances, Oracle VM Server for SPARC, Oracle Solaris 11, and Oracle Enterprise Manager Opls Center 12, which serves as the single point for monitoring and managing the virtualized infrastructure as well as the physical infrastructure. The paper addresses both design best practices and operational best practices.
VirtualBox 4.2Â…
A Fan's Notes
This is a love story about VirtualBox 4.2. Tim Hall says he has been "throwing some RAC, WebLogic and Cloud Control installations on it at home and itÂ’s been coping just fine. IÂ’m especially loving the grouping stuff. Grouping [VMs]and collapsing the group is great!" He does cite one problem, which involves the disappearance of the interface when he dragged one Windows VM (with two virtual disks) into a group. This was rectified by resorting to the Virtual Media Manager to delete the reference to the so-called missing disk and then adding it once again by re-selecting the file from the file system.
IT - Storage
Hard Disk Drives Vs. Solid-State Drives: Are SSDs Finally Worth The Money?
ComputerWorld September 17, 2012
"A lot has changed in three years. For one, laptops are quickly being eclipsed by tablets, which have NAND flash memory embedded on their motherboards. In addition, operating systems like Windows 7 have been optimized to take advantage of SSD I/O performance.

SSDs today are far more reliable, have greater endurance and perform better (in some cases, two to three times better) than in 2009. There are also new SSD categories ..."

What Do Hard Drive-Related Words Like SATA, IDE, and RAID Actually Mean?
NetworkWorld September 17, 2012
"Brainout asked the Hard Drives, NAS Drives, Storage forum to explain some of the words used to describe hard drives and storage.

Technical terms can get overwhelming, especially when they include too many TLAs (three-letter acronyms). Even people who use these terms sometimes need to step back and remember what they're talking about.

So here are some of the most common labels for the technologies used to store data inside your computer: ..."

It's Time to Put Storage on the Strategic IT Roadmap
Internet Evolution September 18, 2012
"In most enterprises, the IT focus these days continues to be on cloud services and Internet-facing applications. If storage is considered at all, it is usually in the context of backup, disaster recovery, and failover. All of these functions are important. They should be on the front page of everyone's cloud deployment plan. But that doesn't change the fact that storage in IT departments continues to lag as a strategic concern.

That needs to change..."

Java Technology
The Java Tutorial: A Short Course on the Basics, 4th Edition (Java Series)
Offers Proficiency in Java SE
"The Java Tutorial: A Short Course on the Basics, 4th Edition (Java Series)" by Sharon Zakhour, Scott Hommel, Jacob Royal, Isaac Rabinovitch, Tom Risser, Mark Hoeber is announced on, which calls the text "a hands-on guide to the Java programming language perfect for any developer looking for a proven path to proficiency with Java SE." The authors have written a completely revised and updated edition to cover Java SE 6 using a tested, interactive approach, featuring real-world problems that teach the Java platform by example. Altogether new chapters cover generics, collections, Java Web Start, the platform environment, and regular expressions.
IT - Technology
IBM Watson Is Ushering In Epoch-Making Change
v3 co uk September 11, 2012
"The computing industry is entering a new era as devices move from merely being programmable to become responsive, learning systems, according to a senior IBM executive. Tom Rosamilia, vice president of corporate strategy, said that tools like the firm's Watson system mark this shift to cognitive systems that could have a huge impact on the corporate world..."
Free and Open Source S/W
Attention CIOs: Shop Open Source First
Amadeus Report Says Proprietary Solutions Take Second Place
"Open for business: The value of Open Source Software in transaction processing" is a paper written by Jim Norton for Amadeus. In his ComputerWorld blog on the paper Loek Essers quotes Norton as having said, "By migrating to open source, enterprises can benefit from greater and swifter innovation, improved supplier responsiveness and enhanced systems accessibility and support." Add to that the comfort level the new generation of IT personnel have in working with open source solutions, not to mention the expected estimated 20 percent savings in licensing costs, and open source looks like a good bet to Norton, even for OLTP.
Shopping for Open Source Solutions?
Here Are 10 Award-winning Apps to Try
InfoWorld's Katherine Noyes summarizes the Best of Open Source Software Awards (the Bossies):

  • Inkscape: Vector graphics editor rivals Adobe Illustrator
  • Audacity: Cross-platform software for audio recording and editing
  • Plone: Industrial strength content management tool
  • KeePass: Stores passwords in a secure database with top-tier encryption
  • Gallery: Web-based photo album organizer
  • Feng Office: Web-based package that integrates project management, client relationship management, billing, and financing
  • Magento: An e-commerce platform
  • OpenEMR: Management tool for electronic health records and medical practice management
  • GnuCash: Personal and small-business financial-accounting software
  • FrontAccounting: Web-based package for managing the entire ERP chain

We will also publish articles for each of the Bossie categories.

Bossies 2012: The Herd Grows in Number
The Best of Open Source Software Awards
InfoWorld's annual Best of Open Source Software Awards for 2012 (Bossie 2012) has grown in scope to include more than 100 products cited for excellence. These products are in seven categories, as Peter Wayner of InfoWorld explains, extending from application development tools to "games and other fun stuff." The categories include:

  • Best open source applications
  • Best open source application development tools
  • Best open source data center and cloud software
  • Best open source databases
  • Best open source desktop applications
  • Best open source networking and security software
  • Now for something completely different

Clearly, the FOSS horizons are limitless.

Bossies 2012: The Best Open Source Business Applications
The Best of Open Source Software Awards
InfoWorld's Bossie Awards 2012 has picked 24 open business applications for recognition. The list includes:

  • Movable Type, WordPress, Plone, Joomla, Drupal, Typo3, Alfresco, Gallery, SugarCRM, vTiger, Magento, Spree, FrontAccounting, Feng Office, Gnucash, OpenERP, Openbravo, xTuple, OrangeHRM, OpenEMR, Pentaho, Bonita Open Solution, Liferay Portal, Diaspora

We will be publishing other Bossie winners over the next few weeks.

Automating the Installation and Setup of Oracle Solaris Cluster 4.0
Using the Automated Installer in Oracle Solaris 11
Lucia Lai has written a procedure that leverages the Solaris 11 Automated Installer (AI) to automate the installation and configuration of an Oracle Solaris Cluster 4.0 cluster. The AI enables the installation of both Oracle Solaris 11 and the Oracle Solaris Cluster 4.0 packages onto the cluster nodes directly from Image Packaging System (IPS) repositories, and the nodes are booted into a new cluster with minimum user intervention. Only cluster nodes that use IPv4 addressing can be configured using the automated installation method. Nodes that use IPv6 addressing must be installed using the standard (manual) IPS installation method.
MySQL Enterprise Monitor 2.3.12
Release Now Available on My Oracle Support Site
MySQL Enterprise Monitor 2.3.12, a maintenance release that contains several new features and fixes a number of bugs, is now available for download on the My Oracle Support (MOS) web site, and, in approximately two weeks, will also be available via the Oracle Software Delivery Cloud, reports Andy Bang in a MySQL Enterprise Tools Blog. Complete details on the release can be found in the changelog.
IT - Cloud
10 Things You Should Do When Moving Disaster Recovery to the Cloud
TechRepublic September 14, 2012
"If youÂ’re incorporating cloud computing into your DR plan, this checklist will help you gain the advantages and avoid the pitfalls.

The use of private and public clouds has most companies revisiting their disaster recovery plans. No one fancies the job — but the cloud can provide new disaster recovery (DR) advantages if IT plays its cards right. Here are 10 things to have on your cloud DR checklist..."

Avoid Moving From a Dumb Pipe to a Dumb Cloud
NetworkWorld September 13, 2012
"Back in 1998 when Google Search started to replace AltaVista, could you imagine the company would be laying fiber in Kansas City in 2012 to offer a 100 times faster Internet service? Or that the New York Stock Exchange would evolve from a trading floor in its 1903 building on Broad Street, to offering virtual and physical colocated computing infrastructure services in its New Jersey data center? ..."
Cloud Computing Leaves the Hype Behind
Washington Technology September 17, 2012
"Cloud computing is growing up and is maturing into a stable market for government contractors.

For several years, cloud computing was in the hype phase. Grand pronouncements were made about flexibility and power, and above all else, cost savings. Like many new technologies, it seemed like cloud computing was the silver bullet for any IT challenge that came down the pike.

Yes, there were plenty of naysayers who talked about security challenges, and others who questioned the ability of cloud computing to really save organizations money.."

Cloud SLAs: Does Your Deal Leave You Exposed?
CIO Insight September 14, 2012
"The potential for cloud service outages raises a basic, but important, question: Would a more stringent SLA have helped your organization avoid problems?

Of course, an SLA can do nothing to prevent an outage caused by a force majeure event, such as Hurricane Isaac. Rather, an SLA is a promise. If a cloud vendor fails to live up to that promise, there are certain, often exclusive, remedies available to the customer, usually in the form of service credits. Sometimes, if negotiated into the SLA, you'll even have right to terminate the cloud services agreements..."

    Don't Tax The Cloud!
    InfoWorld September 14, 2012
    "Joe McKendrick cites a recent survey of tax professionals at KPMG that concludes, frustratingly, that the "cloud is still so new that there still needs to be homework done on what may or may not be taxed." This kind of vagueness drives me nuts. Worse, it fosters a huge sense of financial uncertainty -- one most tech geeks don't even know exists -- around using cloud computing at all."
    GoDaddy Outage a Cautionary Tale for Cloud Enthusiasts
    Insurance Technology September 14, 2012
    "Web-hosting company GoDaddy’s six-hour outage was initially suspected to be the work of hackers, but turned out to be caused by internal factors, leading one of our InformationWeek colleagues to ask, "What's worse for a website hosting company: getting taken down by hackers, or failing to properly configure your network, sparking downtime and lost revenue for customers?" As potential or actual customers of such a company, the GoDaddy incident offers a cautionary tale about how a public cloud environment can create downstream risks for financial services companies — even when the problem is not directly associated with their data..."
      Platform as a Service: Top 10 PaaS Trends of the Next Five Years
      eWeek September 12, 2012
      "IT research and consulting firm Frost & Sullivan recently predicted that the platform as a service (PaaS) market will be the next area of keen competition for cloud innovators because the infrastructure as a service (IaaS) and software as a service (SaaS) spaces have been commoditized. As most software available from the cloud is standardized, enterprises are looking to leverage PaaS offerings as it will be the only stack where a service provider can create differentiation..."
      Private Clouds Will Change IT Jobs, Not Eliminate Them
      NetworkComputing September 18, 2012
      "At the InformationWeek 500 conference, editor at large Charlie Babcock and I held a workshop on private cloud. We learned as much from the audience members as they did from us. One of the more interesting discussions centered on the challenges organizations face in implementing private clouds. For almost all in the room, it wasn't a matter of technical as much as organizational: How do you overcome employee resistance and get them to embrace cloud?"
        IT - CxO
        3 Ways To Kill Your Company's Idea-Stifling Shame Culture
        Fast Company September 13, 2012
        "I had the opportunity to spend a long weekend with fifty CEOs from Silicon Valley. One of the other speakers at the retreat was Kevin Surace, the then CEO of Serious Materials, and Inc. magazine's 2009 Entrepreneur of the Year. I knew Kevin was going to speak about disruptive innovation so in my first conversation with him, before either one of us had spoken to the group and before he knew about my work, I asked him this question: What's the most significant barrier to creativity and innovation?"
          5 Frequently Forgotten Factors in Assessing Risk
          Dark Reading September 13, 2012
          "A proper IT risk assessment can be invaluable to organizations as they make technology and business decisions. Unfortunately, many businesses today don't perform risk assessments at all or they mistake vulnerability assessments or penetration tests as a proper risk assessment, says Scott Laliberte, managing director at Protiviti. And among those who do go through the risk assessment process, many fail to go back and update it as the threat environment or business models change.

          "In this case, the risk assessment becomes dated and misses key issues," he says..."

            10 Ways to Keep Your IT Staff from Jumping Ship
            TechRepublic September 13, 2012
            "If you want to retain the best talent for your shop, you may need to adopt a few strategies to build loyalty and boost morale.

            Attrition can get the best of any business, but there are plenty of ways to make sure the people you hire remain faithful to your company or department. Some methods of employee retention donÂ’t even require you to spend a single penny of your IT budget..."

              Are You Making Management Too Complex?
              Information Management September 10, 2012
              "ThereÂ’s a must-read article that appeared at Fast Company a few months ago by Aaron Levie, entitled, The Simplicity Thesis. The short form is that in this world of increasing complexity, the best opportunities are for those firms, products and services that are minimally complex (simple). The same goes for those of us leading others and managing our organizations..."
                Ten Ways to for CIOs to Get Ahead
                CIO Insight September 14, 2012
                "You've worked your way up the career ladder to the C-Suite, and now as CIO you're leading a mission-critical department in your organization. But how do you take the next step and rise from the ranks of the "tech guy" to a position of influence, respected by departments throughout your company? The following ten recommendations from consulting firm Janco Associates can help..."
                The 2013 CIO Playbook: How to Stop Overspending
                CIO Insight September 18, 2012
                "What causes even the most cautious CIO to overspend? ItÂ’s a question that makes CIOs squirm, if not get defensive. Many have taken painful measures to streamline their operations thanks to a decade of cost-cutting mandates. The question also underscores the risky position that CIOs find themselves in today. The role of CIO in many organizations has expanded in scope beyond being the IT authority to being the driving force behind business innovation. These CIOs have oversight over increasingly large IT budgets and are leading projects that are expected to transform not just the business, but the entire competitive landscape..."
                Think Carefully Before Collecting Data
                CSO Online September 18, 2012
                "In this age of ever plummeting storage costs, some businesses are electing to "store it all" when it comes to consumer data. That is, businesses are storing data regardless of whether there is an actual need with the assumption that it might be of value in the future. This approach, however, can lead to liability from several sources. First, cardholder information arising from credit card transactions is strictly controlled by the PCI Data Security Standards, as well as the card association rules..."
                What CIOs Should Know About 'Outside-In' Architecture
                InformationWeek September 17, 2012
                "Conventional wisdom can change as rapidly as the world around us. With information easily accessible and business processes transparent, standardizing processes, stockpiling resources, and trying to control operations is no longer sufficient. The capabilities that "add value" aren't necessarily classic manufacturing or service activities so much as those that connect capabilities across organizations. Innovation depends upon knowing how to connect..."
                  IT - DR
                  10 Things You Should Do When Moving Disaster Recovery to the Cloud
                  TechRepublic September 14, 2012
                  "If youÂ’re incorporating cloud computing into your DR plan, this checklist will help you gain the advantages and avoid the pitfalls.

                  The use of private and public clouds has most companies revisiting their disaster recovery plans. No one fancies the job — but the cloud can provide new disaster recovery (DR) advantages if IT plays its cards right. Here are 10 things to have on your cloud DR checklist..."

                  IT - Operations
                  GoDaddy Outage a Harsh Reminder That Enterprises Need DNS Redundancy
                  NetworkComputing September 13, 2012
                  "A six-hour outage for GoDaddy, one of the largest website hosting companies and domain registrars, affected thousands and possibly millions of customers earlier this week and serves as a warning for enterprises not to put their DNS eggs all in one basket."
                    Scramble for IPv6 Begins as Europe Depletes IPv4 URLs
                    InfoWorld September 17, 2012
                    "Just four months after the 2012 World IPv6 Launch Day, RIPE NCC -- the RIR (Regional Internet Registry) for Europe, the Middle East, and parts of Central Asia -- has announced that it has distributed its last available blocks of IPv4 address space, urging that "it is now imperative that all stakeholders deploy IPv6 on their networks to ensure the continuity of their online operations and the future growth of the Internet."
                      The Cloud: An Extension of Your Network
                      Federal Computer Week September 18, 2012
                      ThereÂ’s a problem facing more and more network administrators every year, and itÂ’s something thatÂ’s being mandated in the federal government and heralded as a powerful, money-saving tool. ItÂ’s the cloud, and as it becomes more ubiquitous, the issues surrounding it will only become more pronounced.

                      And itÂ’s something thatÂ’s sure to happen. Data bears this out. For instance, in the government sector, the deadline for identifying at least three services to migrate to cloud solutions passed in June.

                        Who Makes The Best 802.11ac Router?
                        IT World September 12, 2012
                        "It's a tricky time to be in the market for a new wireless router. The safe bet is buy a model based on the tried-and-true, rock-solid 802.11n standard--and I recommend that you adopt that course if you're looking for a new router for your small business. Consumers, on the other hand, may fall in love with the blistering speed and phenomenal range that routers based on the second draft of the 802.11ac standard deliver..."
                        Why WAN Optimization Won Over WAFS
                        NetworkWorld September 17, 2012
                        "In the last few columns we've covered two technologies - server virtualization and colocation - that while not WAN technologies per se, are critical components of the Next-generation Enterprise WAN (NEW) architecture, along with WAN Optimization and WAN Virtualization and/or Network-as-a-Service. In this and the following column, I want to cover the last additional technology I consider an integral part of the NEW architecture: distributed/replicated/synchronized file services..."
                          Comcast's 9-11 Lessons
                          Security Management September 14, 2012
                          "The Comcast Center in Philadelphia was still in the planning phase when terrorists struck on 9-11. The landmark property was redesigned to incorporate life-safety lessons from that event. ThatÂ’s one of three examples Security Management explores of how companies meet their security challenges in Philadelphia, host of this yearÂ’s ASIS International Seminar and Exhibits. With 58 stories, 1.2 million square feet, public art space, the worldÂ’s largest indoor video screen, a half-acre public plaza, and a gourmet food market, the Comcast Center was always going to be impressive..."
                          IT - Security
                          How to Find Happiness In A World Of Password Madness
                          NetworkWorld September 19, 2012
                          "... The fundamental problem isnt that these sites should have done a better job protecting user data (though they should have). And it isn't that users chose passwords that were exceedingly easy to crack and then recycled the same flimsy passwords at every site where they registered (though they did).

                          The problem is that passwords have become self-defeating, often impotent tools in the grand scheme of digital security. We need too many of them, and the strong ones are too hard to remember..."

                          Let Someone Break the Rules to Improve Security
                          CSO Online September 14, 2012
                          "Michael Santarcangelo explains why allowing a little non-compliance among staff can actually lead to increased levels of compliance later ...

                          As a parent, my responsibility is to teach my children right from wrong. In security, however, we're not the parents and our job is a bit more nuanced. Letting someone "break" a rule might help build a bond that improves compliance..."

                          Microsoft Discovers Chinese Malware Pre-Installed On New PCs
                          TechWorld September 14, 2012
                          "Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China.

                          In ‘Operation B70’ started in August 2011, Microsoft documents how its Digital Crimes Unit (DCU) bought 20 brand new laptops and desktop PCs from various cities in China, finding that four were infected with pre-installed backdoor malware, including one with a known rootkit called ‘Nitol’..."

                            People as Single Points Of Failure
                            Continuity Central September 14, 2012
                            "All too often we allow people to become single points of failure (SPOF) in our organizations. How should business continuity managers identify and manage such people?

                            IT departments generate more than their fair share of people SPOFs. ItÂ’s a very easy trap to fall into. Many systems or applications require specialist knowledge to resolve problems, support developments and provide recovery. It is not possible to make every team member a subject matter expert for every system or application, plus people have different skills, knowledge, aptitudes and roles..."

                            The 7 Deadly Sins of Information Security
                            CRN September 18, 2012
                            Effective information security is based on more than just maintaining the proper technologies. It's also a matter of making sure that your employees are fully aware of the threats that face them on a daily basis. Security vendor Trustwave has issued a list of seven key issues that most frequently lead to a loss or exposure of data.

                            According to the research, based on more than 300 security breaches worldwide, an overwhelming 87 percent of businesses that had been breached had not developed specific security policies, including security awareness education programs.

                            IT - Careers
                            8 Ways to Advance Your IT Career By Staying Relevant
                            InfoWorld September 20, 2012
                            "In today's economy, it's important to stay current in your industry. Keeping up with the latest trends and technologies is important if you already have a job, and it can be crucial if you are looking for work.

                            How can you stay current when the world of IT field is continually changing? Don't fret. is here and ready to arm you with the knowledge and resources you need to help you use your time wisely..."

                            10 Cross-Platform Tools That Can Make Your Job Easier
                            TechRepublic September 17, 2012
                            "I work in multiple environments throughout the day. Most of the time I am working on Linux. But occasionally, I have to hop on over to a Windows machine for various reasons (usually to help an end user resolve a problem). When I do this, I am thankful there are plenty of cross-platform tools available. These tools range from standard desktop tools to server-based applications."
                            10 Time Management Tips for IT Professionals
                            NetworkWorld September 17, 2012
                            "Time-management skills for most people are learned along the way, a necessary part of getting the job done. However, like most things, the more you invest in it, the greater the reward.

                            To reach your short- or long-term goals, time management is critical for prioritizing tasks, scheduling appointments, emails, projects and so much more, not to mention family responsibilities. What steps can you take to get some of your time back? Like most skills, you can hone your time management practices to sharp edge with a little diligence and practice..."

                            10 Ways Gain Influence At Work
                            Baseline July 28, 2011
                            "You may be good at your job, but can you really make things happen? Are you able to steer the course of events, or are you just swept along by the tide? The upward trajectory of your career may depend upon the perception of you as someone with influence within the organization. And you donÂ’t have to be a senior executive to make an impact, says Terry Bacon, author of the book, 'Elements of Influence: The Art of Getting Others to Follow Your Lead'"
                              Greatest Hits: When Space and Music Collide
                              NetworkWorld September 10, 2012
                              "It seems that space travel and music have been forever linked and a number of artists from the recent song from the Mars Curiosity rover to country legend Buck Owens on Apollo, many artists have written or performed specific music for many different NASA and other space agencies world-wide. Here we take a look and in some cases a listen to some of the greatest space-music collaborations..."
                                Office Attire Divides the Workplace
                                Baseline September 14, 2012
                                "There are considerable differences of opinion when it comes to what is appropriate attire on the part of professionals these days, according to a recent survey from Captivate Network. It could be a generational thing, or it could come down to a gender divide. Either way, the wealth of shorts, golf shirts, tight clothing, flip-flops and exposed tattoos makes many office workers uncomfortable ..."
                                  Questions You Should Never Ask In an Interview
                                  TechRepublic September 18, 2012
                                  "A lot of people are solidly prepared to answer questions of a hiring manager during an interview. Unfortunately, many job candidates are not as prepared to ask interviewers questions. The questions you ask a hiring manager are very important and weigh heavily in their ultimate decision on whom to hire..."
                                    IT - Virtualization
                                    Top Enterprise Controversies of the 3D Web
                                    Internet Evolution September 18, 2012
                                    "If you've been watching the development of videogame technology and user interfaces, you might have noticed that we're getting closer and closer to the point where the Matrix becomes a reality. At some point in the future, most of us will be socializing, working, and having fun in a vast virtual landscape -- also known as the 3D Web, the metaverse, or the hypergrid.

                                    But there are some issues that need to be addressed. I'm not talking about the technical stuff -- that part is easy and inevitable. The pioneers of the new 3D Web have some major philosophical differences on a number of subjects. How these get resolved will help determine the future evolution of the Internet, and, possibly, the future business model of your company..."

                                      Why Virtualization Breaks Monitoring Systems
                                      InfoWorld September 17, 2012
                                      "I like to know what's going on with the stuff I manage, so I'm a big proponent of heavily monitored infrastructures. I've written more code to monitor, manage, and track IT infrastructure components than I can remember. Folks still email me about plug-ins or code I wrote years ago and have since completely forgotten.

                                      Many of those efforts were intended to monitor fixed systems, from UPSes to PDUs, air conditioners, servers, switches, routers, firewalls -- the whole gamut of IT gear. Until recently, they shared one trait: They stayed put in the same data center running on the same hardware using the same IP addresses. These days, except for power and cooling gear, that's not necessarily a safe assumption..."

                                      IT - Compliance
                                      Will The SEC's Fine Against NYSE Open A Can of Worms?
                                      Wall Street & Technology September 14, 2012
                                      "The New York Stock Exchange has settled accusations from the SEC that its trading data gave certain clients a head start on stock data over retail investors. It was the first time the SEC slapped a fine on an exchange. The SEC, which fined the exchange $5 million, claimed the improper actions at NYSE began in 2008, when it began sending data through two of its proprietary feeds before sending market data to the consolidated feeds.

                                      The regulator charged that NYSE failed to monitor the speed of its proprietary feeds compared to its data transmission to the consolidated tape, which is received by retail investors..."

                                      IT - Database
                                      Attack Easily Cracks Oracle Database Passwords
                                      Dark Reading September 19, 2012
                                      "A researcher tomorrow will demonstrate a proof-of-concept attack that lets outside attackers and malicious insiders surreptitiously crack passwords for Oracle databases with a basic brute-force attack. Esteban Martinez Fayo, a researcher with AppSec Inc., will show at the Ekoparty security conference in Buenas Aires, Argentina, an attack exploiting cryptographic flaws he discovered in Oracle's database authentication protocol. It lets an attacker without any database credentials brute-force hack the password hash of any database user so he then can get to the data.

                                      Martinez Fayo and his team first reported the bugs to Oracle in May 2010..."

                                      DBAs And Developers Need To Better Segment Data Access
                                      Dark Reading September 19, 2012
                                      "It's hardly a new idea for network administrators to use segmentation and the development of DMZs to better partition and protect sensitive systems away from rest of the IT infrastructure asset herd. But to DBAs and Web application developers, these ideas may be a little more foreign. According to many data security experts, though, application and data owners would do well to learn a few lessons from their networking brethren.

                                      With better logical separations within database and application environments, organizations could stand to mitigate risks when hackers compromise parts of the data-bearing infrastructure, they say..."

                                      ZFSBuild 2012 Due Soon
                                      More Power than ZFSBuild 2010 at Same Price Point

                                      ZFSBuild 2012 is being designed to deliver more CPU, much more RAM, more cache, better drives, and better chassis than its ZFSBuild 2010 at the same price point: $USD 6765. The original ZFSBuild was based on 12GB of memory. ZFSBuild 2012 starts with 64 GB using 8GB DIMMs. The motherboard has the capacity to go to 256GB with 32GB DIMMÂ’s. The team plans to evaluate Nexenta Enterprise, OpenIndiana, and revisit FreeNASÂ’s ZFS implementation running the same battery of tests used in 2010 for the original ZFSBuild 2010 benchmarks.

                                      IT - Mobile
                                      One Number t Rule Them All: What Smartphones Miss Today
                                      InfoWorld September 14, 2012
                                      "... there have been attempts to make phone numbers and phone connections portable, but they're all unsatisfactory. The truth is that most digital nomads have an office phone, a home office phone, and a mobile phone. It's tempting to consolidate on a smartphone, especially now as major carriers are moving to unlimited voice usage. Because people use less voice service these days as they text and email more, that capacity is increasingly idle, and carriers don't want to allocate it to data because they can make more on it when used for voice -- or raise data fees due to alleged bandwidth scarcity. The hope is to migrate users from landlines to cellular..."
                                        The 10 Most Common Mobile Security Problems and How You Can Fight Them
                                        NetworkWorld September 19, 2012
                                        "When it comes to security, most mobile devices are a target waiting to be attacked. That's pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accountability Office.

                                        Combine the lack of security with the fact that mobile devices are being targeted by cybercriminals and you have a bad situation. For example, the number of variants of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185% in less than a year, the GAO stated..."

                                        IT - Big Data
                                        Big Data, Big Jobs?
                                        ComputerWorld September 20, 2012
                                        "As big data gathers momentum, there's a big career opportunity building as well -- for professionals with the right qualifications, that is.

                                        According to a report published last year by McKinsey & Co., the U.S. could face a shortage by 2018 of 140,000 to 190,000 people with "deep analytical talent" and of 1.5 million people capable of analyzing data in ways that enable business decisions..."

                                        Build Your Big Data Strategy On What Tomorrow Will Look Like
                                        TechRepublic September 17, 2012
                                        "If youÂ’re building your Big Data strategy based on what people are talking about today, you need to start over. Most of whatÂ’s being talked about today is relevant to todayÂ’s conditions: todayÂ’s issues and the technology thatÂ’s suitable to meet todayÂ’s challenges. Unfortunately, thatÂ’s not where your Big Data strategy unfolds. The reason itÂ’s important to clearly define Big Data in competitive terms is to ensure your strategic implementation continually fits within the correct context..."
                                        How Facebook Handles Its Really Big Data
                                        CIO Insight September 18, 2012
                                        Facebook designs its own servers and networking. It designs and builds its own data centers. Its staff writes most of its own applications and creates virtually all of its own middleware. Everything about its operational IT unites it in one extremely large system that is used by internal and external folks alike.

                                        ...Facebook, which has a clear do-it-yourself IT approach, also designs its own servers and networking. It designs and builds its own data centers. Its staff writes most of its own applications and creates virtually all of its own middleware. Everything about its operational IT unites it in one extremely large system that is used by internal and external folks alike..."

                                          IT - BYOD
                                          BYOD: 10 Tips Enterprises Can Use to Protect Their Data
                                          eWeek September 11, 2012
                                          "Never before have so many different devices been brought into the enterprise, whether through the front door, back door or from anywhere else in the world. Bring your own device (BYOD) has become a huge trend as organizations look to reap the productivity benefits of a more engaged workforce while simultaneously making the company a more attractive place to work. Vertic, a digital ad agency, estimated that enterprise tablet adoption is growing by almost 50 percent per year; however, it also found that less than 10 percent of organizations are fully aware of the devices accessing their network..."
                                          Gartner BYOD Study Explores Strategies and Costs
                                          Baseline September 13, 2012
                                          "It's clear that there's no turning back the Bring Your Own Device (BYOD) trend. No doubt in your role as CIO, you're hit with requests daily from employees who want to to bring their own devices into the office to use for work. In some cases, that means using an iPhone or Android-based smartphone. In others, it means allowing them to use an iPad or Samsung Galaxy Tab..."
                                          Top Ten Articles for last few Issues
                                          Vol 175 Issues 1 and 2; Vol 174 Issue 1,2,3, 4 and 5; Vol 173 Issue 4
                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                          • Linux and Solaris Under One Oracle Roof: Interview with Wim Coekearts
                                          • Current SPARC Architectures
                                          • Amping Up Oracle VM VirtualBox 4.2
                                          • ZFS Day
                                          • Oracle Magazine Sept/Oct 2012 - Security on the Move
                                          • Interview about MySQL Connect
                                          • illumos Day
                                          • Secure Deployment of Oracle VM Server for SPARC
                                          • Reviewing Some of the Advanced Features of the Btrfs File System in Oracle Linux
                                          • Managing Oracle Exalogic Elastic Cloud with Oracle Enterprise Manager Ops Centerd 12c

                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                            'Security Inside Out': Oracle's Security Newsletter
                                            September 2012 Features Articles on Security at OpenWorld, Privileged Account Manager
                                            The September 2012 edition of "Security Inside Out," Oracle's security newsletter, is now available. The issue features articles on Security at OpenWorld; FAQ on Label-based Access Controls for multilevel security within Oracle Database 11g; and an overview of Oracle's Privileged Account Manager, a solution that provides advanced administrative and provisioning capabilities to increase the security of high-risk accounts while also streamlining password management. Subscribe today.
                                            Trending in
                                            Vol 234, Issue 3
                                            Trending IT Articles